CN106998471B - Video hiding method and video extracting method for modifying prediction mode - Google Patents

Video hiding method and video extracting method for modifying prediction mode Download PDF

Info

Publication number
CN106998471B
CN106998471B CN201710158035.1A CN201710158035A CN106998471B CN 106998471 B CN106998471 B CN 106998471B CN 201710158035 A CN201710158035 A CN 201710158035A CN 106998471 B CN106998471 B CN 106998471B
Authority
CN
China
Prior art keywords
blocks
secret information
video
prediction mode
group
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710158035.1A
Other languages
Chinese (zh)
Other versions
CN106998471A (en
Inventor
张英男
段俊逸
张敏情
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Engineering University of Chinese Peoples Armed Police Force
Original Assignee
Engineering University of Chinese Peoples Armed Police Force
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Engineering University of Chinese Peoples Armed Police Force filed Critical Engineering University of Chinese Peoples Armed Police Force
Priority to CN201710158035.1A priority Critical patent/CN106998471B/en
Publication of CN106998471A publication Critical patent/CN106998471A/en
Application granted granted Critical
Publication of CN106998471B publication Critical patent/CN106998471B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N19/00Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
    • H04N19/10Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using adaptive coding
    • H04N19/134Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using adaptive coding characterised by the element, parameter or criterion affecting or controlling the adaptive coding
    • H04N19/146Data rate or code amount at the encoder output
    • H04N19/147Data rate or code amount at the encoder output according to rate distortion criteria
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N19/00Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
    • H04N19/10Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using adaptive coding
    • H04N19/134Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using adaptive coding characterised by the element, parameter or criterion affecting or controlling the adaptive coding
    • H04N19/146Data rate or code amount at the encoder output
    • H04N19/149Data rate or code amount at the encoder output by estimating the code amount by means of a model, e.g. mathematical model or statistical model
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N19/00Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
    • H04N19/10Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using adaptive coding
    • H04N19/134Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using adaptive coding characterised by the element, parameter or criterion affecting or controlling the adaptive coding
    • H04N19/157Assigned coding mode, i.e. the coding mode being predefined or preselected to be further used for selection of another element or parameter
    • H04N19/159Prediction type, e.g. intra-frame, inter-frame or bidirectional frame prediction
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N19/00Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
    • H04N19/46Embedding additional information in the video signal during the compression process
    • H04N19/467Embedding additional information in the video signal during the compression process characterised by the embedded information being invisible, e.g. watermarking

Landscapes

  • Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • Algebra (AREA)
  • General Physics & Mathematics (AREA)
  • Mathematical Analysis (AREA)
  • Mathematical Optimization (AREA)
  • Pure & Applied Mathematics (AREA)
  • Compression Or Coding Systems Of Tv Signals (AREA)
  • Image Processing (AREA)

Abstract

The invention discloses a video hiding method and a video extracting method for modifying a prediction mode, which comprise traversing an I frame of a video file and selecting an embedded area; mapping information to be hidden through Logitics, converting the information to be hidden into a binary sequence, and then preprocessing the binary sequence; recording the intra-frame prediction modes of all 4 multiplied by 4 blocks of the embedding area selected in the step 1; determining the parity of the intra-frame prediction modes of all the blocks in each block group, and performing steganography on the prediction modes of the blocks in each group; and traversing each frame of the video file to complete the embedding of the secret information. The information security is improved by improving the random effect of the algorithm, meanwhile, the modification quantity of the embedded block is reduced, and the information hiding efficiency is improved.

Description

Video hiding method and video extracting method for modifying prediction mode
Technical Field
The invention belongs to the technical field of video information hiding, and relates to a video hiding method for modifying a prediction mode; also relates to an extraction method of the video.
Background
People's life has become more and more convenient along with the continuous development of information technology, and networks have become indispensable in social information transfer, have become the main media of human transfer information. With the rapid development of networks and the rapid increase of information transmission amount, the security of information is also becoming a focus of people. The encryption technology in the information security can well ensure the security of the secret information in the transmission process, but the secret information which should be normally displayed is changed into a messy code which is messy and has no seal after encryption, so that the question and the attention of an attacker are easy to cause, and the problem is well solved due to the occurrence of the information hiding technology. Unlike encryption algorithms, steganography is a technique in which secret information to be hidden is transmitted through an open channel or an open carrier, and even if the secret information is intercepted, an attacker can hardly exploit the secret information. Hitherto, information hiding technology has been widely used in the fields of military communication, electronic commerce, public security information, and the like.
Through decades of development, the information hiding technology based on digital images has made great progress, but because the size of the digital images itself is limited, the amount of secret information that can be hidden inside is also limited, and for this reason, it is becoming necessary to research the information hiding algorithm using video as a carrier. Unlike digital images, video has a larger capacity and more redundancy, which makes the hiding of secret information a great possibility.
As a newer video coding standard, h.264/AVC has high compression efficiency and transmission reliability; in addition, it is the most widely used compression standard on networks. The first compression for many video sites is by H.264/AVC. Therefore, it is very valuable to research the information hiding algorithm using H.264/AVC as the coding standard.
The video steganography algorithm is to perform steganography by using the characteristics of a video. The intra-frame prediction is the most fundamental difference of H.264/AVC compared with the conventional compression algorithm, and with the gradual and deep research on compression coding, a video steganography algorithm modified based on the intra-frame prediction has been developed to a certain extent. The effective video information hiding algorithm used in the prior art comprises that an embedded position template is determined by a secret key, the aim of hiding communication is achieved according to an embedding rule between ciphertext information and intra-frame prediction, but the difference between test sequences is large, so the algorithm has no universality.
On the basis, the matrix coding technology is combined, so that the high embedding efficiency is ensured when the prediction mode is modified. The method also comprises another video information hiding algorithm modified based on the H.264/AVC prediction mode, the algorithm selects an embedded area by judging the brightness value of a reference pixel, and then modulates the prediction mode to realize the embedding of secret information, and experimental results show that the information can be extracted blindly, the algorithm can well keep the perceptual quality of the video, and meanwhile, the influence on the bit rate of the video stream is small, but the method for selecting the embedded area is low in accuracy.
In addition, based on the new HEVC technology, there is a common method that includes embedding a prediction mode of a luminance block of hidden information in a modulation frame. The selection of the embedding location using the secret information itself as a key destroys the embedding sequence. But the modification rate of the algorithm is high.
An efficient and high-security video information hiding algorithm is proposed, which can be used for covert communication. The innovations herein are as follows: firstly, secret information is combined with random numbers generated by Logistic mapping, so that the random effect of an algorithm is improved, and the safety of the secret information is guaranteed. Secondly, the embedded region is the prediction mode of the texture block selected by the LBP algorithm, and the influence of the algorithm on the video sequence is ensured to be minimized. And thirdly, hiding the secret information by changing each group of prediction modes.
Disclosure of Invention
The invention aims to provide a video hiding method for modifying a prediction mode; the information security is improved by improving the random effect of the algorithm, meanwhile, the modification quantity of the embedded block is reduced, and the information hiding efficiency is improved.
The invention also provides a video extraction method, which is used for extracting the content of the video subjected to the video hiding method of the modified prediction mode.
The technical scheme of the invention is as follows: a video concealment method for modifying a prediction mode, comprising the steps of:
step 1, traversing an I frame of a video file, and selecting an embedded area;
step 2, preprocessing information to be hidden by Logitics mapping, converting the information to a binary sequence, and encrypting the binary sequence, wherein the operations are as follows:
Figure GDA0002168547970000031
wherein m isiAs original secret information, fiFor processed secret information, piIs a corresponding binary sequence;
step 3, traversing all I frames of the video file, and recording intra-frame prediction modes of all 4 multiplied by 4 blocks of the embedding area selected in the step 1;
step 4, dividing the selected 4 x 4 blocks into groups of three blocks, and determining the parity of intra prediction mode for all blocks in each group of blocks, while combining f in step 2iPerforming steganography on the prediction mode of each group of inner blocks;
and 5, repeating the steps 1-4 until the secret information is embedded.
Furthermore, the invention is characterized in that:
the specific process of determining the parity relationship in each block group in step 4 is as follows: each group of 3 blocks, recorded as C1,C2,C3While F is1(x1),F1(x2),F1(x3) Are respectively C1,C2,C3Current prediction mode of (1), t1And t2Respectively representing the parity mapping relation of two adjacent blocks, if there is F1(x1) And F1(x2) Parity is the same, then t10, otherwise, t11 is ═ 1; if F1(x2) And F1(x3) Parity is the same, then t20, otherwise, t2=1。
The specific method for steganography of the prediction mode of each group of blocks in the step 4 is as follows: preprocessing the secret information fiGrouping, wherein each group has two bits of information respectively, s1And s2Modifying the prediction mode of the corresponding block within each group of blocks to be embedded such that
Figure GDA0002168547970000041
The mapping relation is established, and the embedding effect is achieved.
Wherein t is1、t2、s1、s2The mapping rule with the block prediction mode is as follows: t is t1=s1&t2=s2No modification; t is t1≠s1&t2=s2Modifying C1Prediction mode of (1), and parity and F1(x1) The difference is that; t is t1=s1&t2≠s2Modifying C3Prediction mode of (1), and parity and F1(x2) The difference is that; t is t1≠s1&t2≠s2Modifying C2The prediction mode of (1).
The specific method for modifying the prediction mode of each group of blocks in the step 4 is as follows:
Figure GDA0002168547970000042
mjthe element belongs to S, and the S is { IMODE | IMODEMod2 ≠ cur _ modemod2 }; sub _ mode is an alternative intra-frame prediction mode, cur _ mode is a current intra-frame prediction mode, J (·,) is a Lagrangian rate-distortion optimization model, and S is a sample.
The invention also provides a video extraction method, wherein the video file extracted by the method is a hidden video file of the video hiding method for modifying the prediction mode, and the method comprises the following steps:
step 1, restoring a video sequence, traversing all I frames of the video sequence, and recording prediction modes of all 4 multiplied by 4 blocks of the video sequence;
step 2, grouping all 4 multiplied by 4 blocks, wherein every three blocks are 1 group and are respectively defined as C1',C2',C3', the prediction modes thereof are respectively F1'(x1),F1'(x2),F1'(x3);
Step 3, acquiring the secret information of each group according to the prediction mode of each group of blocks, and extracting the secret information;
step 4, repeating the step 3 until all secret information is obtained;
step 5, generating a Logitics random sequence according to the initial value same as that in the steganography step 2, converting the Logitics random sequence into a binary sequence, and carrying out XOR processing on the secret information acquired in the step 4 and the binary sequence, specifically to be
Figure GDA0002168547970000051
Obtaining original secret information mi,fiFor the secret information extracted in step 4, piBinary sequences are mapped for the corresponding Logistics.
Furthermore, the invention is characterized in that:
wherein in step 3, the block advance is carried out according to each groupThe specific process of obtaining the secret information of the group by the test mode is as follows: f1'(x1)mod2=F1'(x2)mod2&&F1'(x2)mod2=F1'(x3) mod2, secret information 00; f1'(x1)mod2=F1'(x2)mod2&&F1'(x2)mod2≠F1'(x3) mod2, secret 01; f1'(x1)mod2≠F1'(x2)mod2&&F1'(x2)mod2=F1'(x3) mod2, secret information 10; f1'(x1)mod2≠F1'(x2)mod2&&F1'(x2)mod2≠F1'(x3) mod2, the secret is 11.
The invention has the beneficial effects that: the method is an H.264/AVC video steganography method based on a modified prediction mode, the texture characteristics of blocks are judged by an improved local binary mode method, namely whether the blocks can be embedded or not is judged, then the prediction mode of the selected embedded blocks is judged, every three embedded blocks are divided into one group, then the information embedding is carried out on the secret information processed by a chaos sequence generated by Logitics mapping, wherein 2-bit secret information is embedded into each group, if the secret information is 10, the parity of the intra-frame prediction modes of the first two blocks in each group to be embedded is required to be different, the parity of the second two blocks is the same, and other rules are similar; wherein the intra prediction mode of the block is modified by a lagrangian rate-distortion optimization algorithm to change the prediction mode. The PSNR value of the test video sequence is reduced by about 0.970dB before and after embedding, namely, the test video sequence has better visual invisibility, lower modification rate and higher embedding efficiency, and the bit rate increment after steganography is smaller. In conclusion, the algorithm can well complete the effect of covert communication.
Drawings
FIG. 1 is a diagram showing the effect of the method of the present invention before information hiding for QCIF video files;
FIG. 2 is a diagram showing the effect of information hiding of QCIF video files according to the method of the present invention;
FIG. 3 is a diagram illustrating an effect of the method of the present invention before information hiding is performed on a CIF video file;
fig. 4 is a diagram of the effect of the method of the present invention after hiding information of a CIF video file.
Detailed Description
The invention is described in further detail below with reference to the accompanying drawings:
the invention provides a video hiding method for modifying a prediction mode, which comprises the following specific implementation modes:
selecting an H.264/AVC coding standard video file, wherein the sizes of the luminance block components are respectively as follows: 16 × 16, 16 × 8, 8 × 16, 8 × 8, 8 × 4, 4 × 8, and 4 × 4; texture blocks are typically encoded using small-sized partitions, while smooth regions, i.e., non-texture blocks, are typically encoded using large-sized blocks. Generally, human eyes are less sensitive to texture blocks and more sensitive to changes of smooth areas, and in order to ensure the most basic condition of steganography, namely invisibility of secret information, a 4 × 4 luminance block in a frame with high texture complexity is selected to embed the secret information.
A local binary pattern (LBP algorithm) is used to select a reasonable embedding region to embed the secret information. The main idea of the LBP algorithm is to compare the pixel values, and compare the pixel with the central value and the neighboring pixels to obtain a binary code to reflect the local texture features. The algorithm is defined in a 3 × 3 window, the pixel value of the central point is compared with the adjacent 8 pixel values, and the point smaller than the pixel value of the central point is marked as 0, otherwise, the point is marked as 1. After the comparison is completed, the value of 8-bit binary number formed clockwise is the LBP value, taking the upper left corner value as the starting point, for example
Figure GDA0002168547970000071
Can be converted into
Figure GDA0002168547970000072
Conversion to binary number 11000100; the invention adopts 4 x 4 block, that is, in the 4 x 4 block area, the 3 x 3 block is clockwise slid to generate four 3 x 3 blocks, then the average value of its binary number is the LBP standard difference threshold in said areaThe area above the threshold is an area suitable for embedding secret information. E.g. 4 x 4 blocks into
Figure GDA0002168547970000073
Then the four 3 × 3 partitions it converts to are:
Figure GDA0002168547970000074
Figure GDA0002168547970000075
the corresponding binary sequences are 11011110, 10110110, 00100000 and 00010001, and the LBP standard deviation threshold is
Figure GDA0002168547970000076
Where x is the mean value of 4 LBP values 01110001.
Then processing the secret information, preprocessing the secret information to obtain a secret information stream M, and preprocessing the secret information by selecting a stream cipher encryption method. The method specifically comprises the following steps:
a large number of numbers are generated through Logitics mapping, and a formula is formed
Figure GDA0002168547970000077
Transforming it into a binary sequence; wherein
Figure GDA0002168547970000081
m is the total number of all numbers generated by the process, α is the weight, and α E [0.5,1 ]]It is the key that the difference of α can lead to the difference of x (i) after the chaos sequence transform, further enhancing the random effect of the secret information, i.e. the probability of becoming 0 or 1 is different for each operation.
In order to ensure the random effect of the ciphertext, a sequence after 500 bits is selected for operation; converting the secret information to be hidden into a binary sequence, and performing the following operations:
Figure GDA0002168547970000082
wherein m isiAs original secret information, fiFor the processed sequence, piSequences are mapped for the corresponding Logistics. In this case, the processed secret information has high security and high randomness. And divides each two bits of secret information into one group.
Traversing a first frame of a video file, and recording all 4 multiplied by 4 block intra-prediction modes on the first frame; then dividing every three 4 x 4 blocks into a block group and recording the blocks as C1,C2,C3While F is1(x1),F1(x2),F1(x3) Are respectively C1,C2,C3The current prediction mode of (2); using t1And t2Representing the parity mapping of the three blocks, then there is F1(x1) And F1(x2) Parity is the same, then t10, otherwise, t11 is ═ 1; if F1(x2) And F1(x3) Parity is the same, then t20, otherwise, t2=1。
Secret information of one set of two bits is distributed to each block group, and the two bits of the secret information are s1And s2Satisfy the corresponding mapping relation
Figure GDA0002168547970000083
I.e. specific t thereof1、t2、s1、s2The mapping rule with the block prediction mode is as follows:
Figure GDA0002168547970000084
the method for modifying the prediction mode of each group of blocks is
Figure GDA0002168547970000091
mjThe element belongs to S, and the S is { IMODE | IMODEMod2 ≠ cur _ modemod2 }; wherein sub _ mode is the alternative intra prediction mode, cur _ mode is the current prediction mode, and J (-) is the Lagrangian rate lossAnd (4) a true optimization model, wherein S is a sample. J (S, I | λ) ═ D (S, I) + λ × R (S, I), λ is a parameter in the Lagrangian rate-distortion model, D (S, I) and R (S, I) respectively represent the distortion degree and bit rate of the output code stream, and the code stream is the output when the sample S is encoded by using the encoding mode I.
And repeating the steps to perform the same operation on other frames of the video sequence, and finally completing the information hiding of the video file to obtain the video file with the hidden information.
The invention also provides a video extraction method, the video file targeted by the video extraction method is the video file hidden by the hiding method, and the specific embodiment of the video extraction method is as follows:
firstly, restoring a video sequence, traversing a first frame of the video sequence, and recording prediction modes of all 4 multiplied by 4 blocks; every third block C1',C2',C3' set as a group, denoted as C1',C2',C3', their respective prediction modes are F1'(x1),F1'(x2),F1'(x3) (ii) a The secret information is extracted according to the following rules,
Figure GDA0002168547970000092
traversing all frames of the video sequence, repeating the above steps to obtain the secret information fiAnd (4) extracting the whole.
Generating a random sequence according to the initial value of the Logitics sequence of the frame, converting the random sequence into a binary sequence, and performing exclusive OR processing on the secret information acquired in the step 4 and the binary sequence, specifically to
Figure GDA0002168547970000093
Obtaining original secret information mi,piBinary sequences are mapped for corresponding logics. And finally, original secret information of the video file is obtained, and the video file is restored.
The experimental results and analysis of the method of the invention are as follows:
the experimental platform is H.264 reference software model X.264, and the programming environment is Microsoft Visual C + +2008 and MATLAB 2012. The experimental computer is a Core i5 processor, the main frequency is 2.40GHz, and the memory is 3.0GB RAM. Video used for the experiments was a standard test sequence downloaded from a website with the website address "medium. x phg", in the sequence formats including Grandma, Salesman and Soccer for QCIF (176 x 144), and Stefan, Paris and Mobile for CIF (352 x 288). A video sequence encodes an I-frame every 15 frames.
As shown in the drawings, fig. 2 and 4 are luminance components of video sequence frames after steganography by the method of the present invention, and fig. 1 and 3 are luminance components of original video frames. Subjectively, the algorithm of the invention has better visual invisibility; the Peak Signal to Noise Ratio (PSNR) is objectively adopted as a standard for judging the quality of an image, and the PSNR calculation formula is as follows:
Figure GDA0002168547970000101
wherein MSE is defined as the mean square error of the video image sequence before and after steganography, and the calculation formula is as follows:
Figure GDA0002168547970000102
wherein f is1For the original video frame image, f2The image is a frame containing a dense image, K is the number of frames, and M multiplied by N is the size of the frame image.
Figure GDA0002168547970000103
The table above shows the comparison of the PSNR values of the luminance components of the test sequences Grandma, Salesman, Soccer, Stefan, Paris and Mobile before and after embedding the secret information. The result shows that the PSNR value of the video sequence after embedding the secret information is averagely reduced by about 0.970dB compared with the PSNR value of the brightness component of the original test sequence, and the video sequence is slightly influenced by performing steganography by using the text algorithm.
Figure GDA0002168547970000111
The table shows the bit rate variation before and after embedding the secret information, and it is seen from the table that the bit rate variation is small using the method of the present invention.
The modification rate for the carrier is the ratio between the number of bits of the modified carrier and the secret information embedded therein after steganography, defined as α - β/γ, where α represents the modification rate, β represents the number of modified blocks, and γ represents the number of embedded bits.
In the present invention, the hidden 2bits secret information only needs to modify one intra prediction mode, so β is equal to 1, and γ is equal to 2, i.e. the modification rate is only 1/2 at the highest, and the embedding efficiency is 2 at the lowest.
When the embedding capacity is the same, the method only needs to modify half of the number of the secret information intra-frame prediction blocks, so the algorithm has a lower modification rate, and can also show that the embedding efficiency is higher.

Claims (3)

1. A method for video concealment that modifies the prediction mode, comprising the steps of:
step 1, traversing an I frame of a video file, and selecting an embedded area;
step 2, preprocessing information to be hidden by Logitics mapping, converting the information to a binary sequence, and encrypting the binary sequence, wherein the operations are as follows:
Figure FDA0002287525740000011
wherein m isiAs original secret information, fiFor processed secret information, piMapping a binary sequence for the corresponding Logitics;
generating a large number of numbers by Logitics mapping, by formula
Figure FDA0002287525740000012
Transforming it into a binary sequence; wherein
Figure FDA0002287525740000013
m is throughThe total number of all numbers generated, α, is weighted, and α ∈ [0.5,1],xiIth digit, i e [1, m ], generated for Logitics mapping];
Step 3, traversing all I frames of the video file, and recording intra-frame prediction modes of all 4 multiplied by 4 blocks of the embedding area selected in the step 1;
step 4, dividing the selected 4 x 4 blocks into groups of three blocks, and determining the parity of intra prediction mode for all blocks in each group of blocks, while combining f in step 2iPerforming steganography on the prediction mode of each group of inner blocks; specifically, every three 4 × 4 blocks are divided into a block group, and the blocks are recorded as C1,C2,C3While F is1(x1),F1(x2),F1(x3) Are respectively C1,C2,C3The current prediction mode of (2); using t1And t2Representing the parity mapping of the three blocks, then there is F1(x1) And F1(x2) Parity is the same, then t10, otherwise, t11 is ═ 1; if F1(x2) And F1(x3) Parity is the same, then t20, otherwise, t2=1,
Secret information of one set of two bits is distributed to each block group, and the two bits of the secret information are s1And s2Satisfy the corresponding mapping relation
Figure FDA0002287525740000014
I.e. specific t thereof1、t2、s1、s2The mapping rule with the block prediction mode is as follows:
Figure FDA0002287525740000015
Figure FDA0002287525740000021
the method for modifying the prediction mode of each group of blocks is
Figure FDA0002287525740000022
mjBelongs to S, wherein S is { IMODE | IMODE mod2 ≠ cur _ mode mod2 }; sub _ mode is a replaced intra-frame prediction mode, cur _ mode is a current prediction mode, J (·,) is a Lagrangian rate-distortion optimization model, and S is a sample; lambda [ alpha ]MODEOptimizing specific parameters of the model for rate distortion;
and 5, repeating the steps 1-4 until the secret information is completely embedded.
2. The method according to claim 1, wherein the specific process of determining the parity relationship in each block group in step 4 is: each group of 3 blocks, recorded as C1,C2,C3While F is1(x1),F1(x2),F1(x3) Are respectively C1,C2,C3Current prediction mode of (1), t1And t2Respectively representing the parity mapping relation of two adjacent blocks, if there is F1(x1) And F1(x2) Parity is the same, then t10, otherwise, t11 is ═ 1; if F1(x2) And F1(x3) Parity is the same, then t20, otherwise, t2=1。
3. A video extraction method for extracting a hidden video file to be subjected to the prediction mode modification video hiding method according to claim 1 or 2, comprising the steps of:
step 1', recovering a video sequence, traversing all I frames of the video sequence, and recording all prediction modes of 4 multiplied by 4 blocks of the video sequence;
step 2', all 4 × 4 blocks are grouped, wherein every three blocks are 1 group and are respectively defined as C1',C2',C3', its prediction modeAre respectively F1'(x1),F1'(x2),F1'(x3);
Step 3', secret information of each group is obtained according to the prediction mode of each group of blocks, and the secret information is extracted;
step 4 ', repeating step 3' until all secret information is obtained;
step 5 ', generating Logitics random sequence according to the initial value same as that in the steganography step 2, converting the Logitics random sequence into a binary sequence, and carrying out XOR processing on the secret information acquired in the step 4' and the binary sequence, specifically to be
Figure FDA0002287525740000031
Obtaining original secret information mi,fiFor the secret information extracted in step 4', piMapping a binary sequence for the corresponding Logitics; the specific process of acquiring the secret information of each group according to the prediction mode of each group of blocks in the step 3' is as follows: f1'(x1)mod 2=F1'(x2)mod 2&&F1'(x2)mod 2=F1'(x3) mod2, secret information 00; f1'(x1)mod 2=F1'(x2)mod2&&F1'(x2)mod 2≠F1'(x3) mod2, secret information 01; f1'(x1)mod 2≠F1'(x2)mod 2&&F1'(x2)mod 2=F1'(x3) mod2, secret information is 10; f1'(x1)mod 2≠F1'(x2)mod 2&&F1'(x2)mod 2≠F1'(x3) mod2, secret information 11.
CN201710158035.1A 2017-03-16 2017-03-16 Video hiding method and video extracting method for modifying prediction mode Active CN106998471B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710158035.1A CN106998471B (en) 2017-03-16 2017-03-16 Video hiding method and video extracting method for modifying prediction mode

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710158035.1A CN106998471B (en) 2017-03-16 2017-03-16 Video hiding method and video extracting method for modifying prediction mode

Publications (2)

Publication Number Publication Date
CN106998471A CN106998471A (en) 2017-08-01
CN106998471B true CN106998471B (en) 2020-03-17

Family

ID=59431085

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710158035.1A Active CN106998471B (en) 2017-03-16 2017-03-16 Video hiding method and video extracting method for modifying prediction mode

Country Status (1)

Country Link
CN (1) CN106998471B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110430335B (en) * 2019-08-02 2021-05-11 陕西师范大学 Information disguising and recovering method, equipment and storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6031914A (en) * 1996-08-30 2000-02-29 Regents Of The University Of Minnesota Method and apparatus for embedding data, including watermarks, in human perceptible images
CN101059957A (en) * 2007-05-24 2007-10-24 华中科技大学 An audio coding selective cryptographic method
CN104602016A (en) * 2015-01-12 2015-05-06 宁波大学 HEVC video information hiding method based on intra-frame prediction mode difference
CN104902281A (en) * 2015-05-25 2015-09-09 宁波大学 Hamming code plus one-based information hiding method of HEVC video
CN105681803A (en) * 2016-01-21 2016-06-15 宁波大学 High capacity HEVC video information hiding method
CN106162195A (en) * 2016-07-05 2016-11-23 宁波大学 A kind of 3D HEVC deep video information concealing method based on single depth frame internal schema

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6031914A (en) * 1996-08-30 2000-02-29 Regents Of The University Of Minnesota Method and apparatus for embedding data, including watermarks, in human perceptible images
CN101059957A (en) * 2007-05-24 2007-10-24 华中科技大学 An audio coding selective cryptographic method
CN104602016A (en) * 2015-01-12 2015-05-06 宁波大学 HEVC video information hiding method based on intra-frame prediction mode difference
CN104902281A (en) * 2015-05-25 2015-09-09 宁波大学 Hamming code plus one-based information hiding method of HEVC video
CN105681803A (en) * 2016-01-21 2016-06-15 宁波大学 High capacity HEVC video information hiding method
CN106162195A (en) * 2016-07-05 2016-11-23 宁波大学 A kind of 3D HEVC deep video information concealing method based on single depth frame internal schema

Also Published As

Publication number Publication date
CN106998471A (en) 2017-08-01

Similar Documents

Publication Publication Date Title
Cao et al. High capacity reversible data hiding in encrypted images by patch-level sparse representation
Qin et al. Reversible data hiding in encrypted image with separable capability and high embedding capacity
Kelash et al. Hiding data in video sequences using steganography algorithms
Yang et al. Reversible data hiding in medical images with enhanced contrast in texture area
CN103426141B (en) A kind of image content authentication method and system
CN107493405A (en) Encrypted image reversible information hidden method based on coding compression
Lin et al. Adaptive embedding techniques for VQ-compressed images
Sarmah et al. JPEG based steganography methods using cohort intelligence with cognitive computing and modified multi random start local search optimization algorithms
Guo et al. High capacity data hiding for error-diffused block truncation coding
CN112911290B (en) Ciphertext image reversible data hiding method based on predictive difference compression coding
CN110475038B (en) Character and picture generating type hiding and recovering method combined with minimum closure coding
Wu et al. High-capacity reversible data hiding in encrypted images by bit plane partition and MSB prediction
Cheddad et al. Enhancing steganography in digital images
Chang et al. A difference expansion based reversible information hiding scheme with high stego image visual quality
Kelash et al. Utilization of steganographic techniques in video sequences
Fu et al. Adaptive embedding combining LBE and IBBE for high-capacity reversible data hiding in encrypted images
CN107507254B (en) Compression of images encryption method based on arithmetic coding
CN106998471B (en) Video hiding method and video extracting method for modifying prediction mode
Phadikar et al. Quality access control of compressed color images using data hiding
Tran et al. Lsb data hiding in digital media: a survey
CN114782563B (en) Secret image sharing method and system for JPEG image
Amsden et al. Transmitting hidden information using steganography via Facebook
Mittal et al. Interpolative AMBTC based reversible data hiding in encrypted images using rhombus mean
CN113382127B (en) Encrypted image reversible information hiding method with elastic selection and run-length coding
Li et al. High‐Capacity Reversible Data Hiding in Encrypted Images by Information Preprocessing

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant